Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(RBAC). Showing records 1 – 30 of 40 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


Dalhousie University

1. Khandavilli, Ambica Pawan. A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION.

Degree: Master of Computer Science, Faculty of Computer Science, 2012, Dalhousie University

 Controlled access to confidential information and resources is a critical element in security systems. Role based access control (RBAC) has gained widespread usage in modern… (more)

Subjects/Keywords: NFC; RBAC; IBE

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Khandavilli, A. P. (2012). A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/14604

Chicago Manual of Style (16th Edition):

Khandavilli, Ambica Pawan. “A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION.” 2012. Masters Thesis, Dalhousie University. Accessed February 28, 2021. http://hdl.handle.net/10222/14604.

MLA Handbook (7th Edition):

Khandavilli, Ambica Pawan. “A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION.” 2012. Web. 28 Feb 2021.

Vancouver:

Khandavilli AP. A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION. [Internet] [Masters thesis]. Dalhousie University; 2012. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10222/14604.

Council of Science Editors:

Khandavilli AP. A MOBILE ROLE BASED ACCESS CONTROL SYSTEM USING IDENTITY BASED ENCRYPTION WITH NON-INTERACTIVE ZERO KNOWLEDGE PROOF OF AUTHENTICATION. [Masters Thesis]. Dalhousie University; 2012. Available from: http://hdl.handle.net/10222/14604

2. Sladić Goran. Model kontekstno zavisne kontrole pristupa u poslovnim sistemima.

Degree: 2011, University of Novi Sad

Kontrola pristupa odnosno autorizacija, u širem smislu, razmatra na koji način korisnici mogu pristupiti resursima računarskog sistema i na koji način ih koristiti. Ova… (more)

Subjects/Keywords: Kontrola pristupa, kontekst, RBAC PO poslovni tokovi; Access control, context, RBAC, work°ow

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Goran, S. (2011). Model kontekstno zavisne kontrole pristupa u poslovnim sistemima. (Thesis). University of Novi Sad. Retrieved from https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacijadisertacija.pdf?controlNumber=(BISIS)82079&fileName=disertacija.pdf&id=480&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=82079&source=OATD&language=en ; http://dx.doi.org/10.2298/NS2011SLADICGORAN ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=267644935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Goran, Sladić. “Model kontekstno zavisne kontrole pristupa u poslovnim sistemima.” 2011. Thesis, University of Novi Sad. Accessed February 28, 2021. https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacijadisertacija.pdf?controlNumber=(BISIS)82079&fileName=disertacija.pdf&id=480&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=82079&source=OATD&language=en ; http://dx.doi.org/10.2298/NS2011SLADICGORAN ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=267644935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Goran, Sladić. “Model kontekstno zavisne kontrole pristupa u poslovnim sistemima.” 2011. Web. 28 Feb 2021.

Vancouver:

Goran S. Model kontekstno zavisne kontrole pristupa u poslovnim sistemima. [Internet] [Thesis]. University of Novi Sad; 2011. [cited 2021 Feb 28]. Available from: https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacijadisertacija.pdf?controlNumber=(BISIS)82079&fileName=disertacija.pdf&id=480&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=82079&source=OATD&language=en ; http://dx.doi.org/10.2298/NS2011SLADICGORAN ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=267644935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Goran S. Model kontekstno zavisne kontrole pristupa u poslovnim sistemima. [Thesis]. University of Novi Sad; 2011. Available from: https://www.cris.uns.ac.rs/DownloadFileServlet/Disertacijadisertacija.pdf?controlNumber=(BISIS)82079&fileName=disertacija.pdf&id=480&source=OATD&language=en ; https://www.cris.uns.ac.rs/record.jsf?recordId=82079&source=OATD&language=en ; http://dx.doi.org/10.2298/NS2011SLADICGORAN ; http://vbs.rs/scripts/cobiss?command=SEARCH&base=99999&select=ID=267644935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kaunas University of Technology

3. Dzedulionis, Vaidas. Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą.

Degree: Master, Informatics Engineering, 2009, Kaunas University of Technology

Vienas iš pagrindinių dalykų programų sistemų kūrime, į kuriuos kreipiama labai daug dėmesio, yra duomenų saugumas. Daug vartotojų turinčiose sistemose, tokiose kaip įvairūs socialiniai tinklai,… (more)

Subjects/Keywords: Prieigos teisės; Prieigos kontrolė; RBAC; MAC; DAC; Access rights; Access control; RBAC; MAC; DAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Dzedulionis, Vaidas. (2009). Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090715_101831-73468 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Dzedulionis, Vaidas. “Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą.” 2009. Masters Thesis, Kaunas University of Technology. Accessed February 28, 2021. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090715_101831-73468 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Dzedulionis, Vaidas. “Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą.” 2009. Web. 28 Feb 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Dzedulionis, Vaidas. Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą. [Internet] [Masters thesis]. Kaunas University of Technology; 2009. [cited 2021 Feb 28]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090715_101831-73468 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Dzedulionis, Vaidas. Prieigos teisių paskirstymas daug vartotojų turinčioje sistemoje, užtikrinant informacijos patikimumą. [Masters Thesis]. Kaunas University of Technology; 2009. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2009~D_20090715_101831-73468 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Kaunas University of Technology

4. Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.

Degree: Master, Informatics Engineering, 2011, Kaunas University of Technology

Tobulėjant mobilioms technologijoms vietos informacija tapo svarbi prieigos valdymui. Šiame darbe analizuojamos vietos informacijos derinimo su autentifikacijos ir prieigos valdymo mechanizmais galimybės. Darbe išskirti vietos… (more)

Subjects/Keywords: Prieigos valdymas; Bevielis tinkas; Vietos informacija pagrįsta autentifikacija; Geo-RBAC; Access control; Wireless LAN; Location-based authentication; Geo-RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petrauskienė, Rasa. (2011). Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. (Masters Thesis). Kaunas University of Technology. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Petrauskienė, Rasa. “Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.” 2011. Masters Thesis, Kaunas University of Technology. Accessed February 28, 2021. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Petrauskienė, Rasa. “Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją.” 2011. Web. 28 Feb 2021.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. [Internet] [Masters thesis]. Kaunas University of Technology; 2011. [cited 2021 Feb 28]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Petrauskienė, Rasa. Prieigos prie bevielio tinklo resursų valdymas panaudojant vietos informaciją. [Masters Thesis]. Kaunas University of Technology; 2011. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2011~D_20110901_140213-99282 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Colorado State University

5. Abdunabi, Ramadan. Access control framework for mobile applications, An.

Degree: PhD, Computer Science, 2013, Colorado State University

 With the advent of wireless and mobile devices, many new applications are being developed that make use of the spatio-temporal information of a user in… (more)

Subjects/Keywords: access control; access control protocol; computer security; enforcement; policy model; RBAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abdunabi, R. (2013). Access control framework for mobile applications, An. (Doctoral Dissertation). Colorado State University. Retrieved from http://hdl.handle.net/10217/78814

Chicago Manual of Style (16th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Doctoral Dissertation, Colorado State University. Accessed February 28, 2021. http://hdl.handle.net/10217/78814.

MLA Handbook (7th Edition):

Abdunabi, Ramadan. “Access control framework for mobile applications, An.” 2013. Web. 28 Feb 2021.

Vancouver:

Abdunabi R. Access control framework for mobile applications, An. [Internet] [Doctoral dissertation]. Colorado State University; 2013. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10217/78814.

Council of Science Editors:

Abdunabi R. Access control framework for mobile applications, An. [Doctoral Dissertation]. Colorado State University; 2013. Available from: http://hdl.handle.net/10217/78814

6. Blumberg, Joseph Frederick. Impediment sensitive-role based access control.

Degree: 2011, James Madison University

 This paper introduces a variation to the Role Based Access Control (RBAC) model called Impediment Sensitive RBAC (IS-RBAC) to be used for implantable and closely-worn… (more)

Subjects/Keywords: RBAC; role based access control; information security; InfoSec; Computer Sciences

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Blumberg, J. F. (2011). Impediment sensitive-role based access control. (Masters Thesis). James Madison University. Retrieved from https://commons.lib.jmu.edu/master201019/154

Chicago Manual of Style (16th Edition):

Blumberg, Joseph Frederick. “Impediment sensitive-role based access control.” 2011. Masters Thesis, James Madison University. Accessed February 28, 2021. https://commons.lib.jmu.edu/master201019/154.

MLA Handbook (7th Edition):

Blumberg, Joseph Frederick. “Impediment sensitive-role based access control.” 2011. Web. 28 Feb 2021.

Vancouver:

Blumberg JF. Impediment sensitive-role based access control. [Internet] [Masters thesis]. James Madison University; 2011. [cited 2021 Feb 28]. Available from: https://commons.lib.jmu.edu/master201019/154.

Council of Science Editors:

Blumberg JF. Impediment sensitive-role based access control. [Masters Thesis]. James Madison University; 2011. Available from: https://commons.lib.jmu.edu/master201019/154


Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ)

7. Μπαλτατζής, Δημήτριος. Dynamic authorizations for secure internet applications.

Degree: 2012, Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ)

Over recent years, with the ever-increasing availability of networks and the advancements in their underlying infrastructure, Collaborative Environments (CE) have become commonplace: hospitals participating in… (more)

Subjects/Keywords: Εξουσιοδοτήσεις; Διαδίκτυο; Πληροφορική; Ασφάλεια; Information; RBAC; Security; Authorization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Μπαλτατζής, . . (2012). Dynamic authorizations for secure internet applications. (Thesis). Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ). Retrieved from http://hdl.handle.net/10442/hedi/28181

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Μπαλτατζής, Δημήτριος. “Dynamic authorizations for secure internet applications.” 2012. Thesis, Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ). Accessed February 28, 2021. http://hdl.handle.net/10442/hedi/28181.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Μπαλτατζής, Δημήτριος. “Dynamic authorizations for secure internet applications.” 2012. Web. 28 Feb 2021.

Vancouver:

Μπαλτατζής . Dynamic authorizations for secure internet applications. [Internet] [Thesis]. Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ); 2012. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10442/hedi/28181.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Μπαλτατζής . Dynamic authorizations for secure internet applications. [Thesis]. Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ); 2012. Available from: http://hdl.handle.net/10442/hedi/28181

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

8. Harryson, Magnus. Language-based permissions in embedded systems .

Degree: Chalmers tekniska högskola / Institutionen för data och informationsteknik, 2020, Chalmers University of Technology

 Embedded devices connected to the Internet are at risk of being targeted by malware attacks that may either use the vulnerable devices as part of… (more)

Subjects/Keywords: Datalog; access control; FreeRTOS; RBAC; embedded system; computer science; C; macro

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Harryson, M. (2020). Language-based permissions in embedded systems . (Thesis). Chalmers University of Technology. Retrieved from http://hdl.handle.net/20.500.12380/302095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Harryson, Magnus. “Language-based permissions in embedded systems .” 2020. Thesis, Chalmers University of Technology. Accessed February 28, 2021. http://hdl.handle.net/20.500.12380/302095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Harryson, Magnus. “Language-based permissions in embedded systems .” 2020. Web. 28 Feb 2021.

Vancouver:

Harryson M. Language-based permissions in embedded systems . [Internet] [Thesis]. Chalmers University of Technology; 2020. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/20.500.12380/302095.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Harryson M. Language-based permissions in embedded systems . [Thesis]. Chalmers University of Technology; 2020. Available from: http://hdl.handle.net/20.500.12380/302095

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kent State University

9. Albalawi, Talal S. A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL.

Degree: PhD, College of Arts and Sciences / Department of Computer Science, 2016, Kent State University

 Proper access control is one of the most important issues in computer security. It consists of securing a system in the form of availability, confidentiality,… (more)

Subjects/Keywords: Computer Science; Integrity, Dynamic Integrity, Access Control, BIBA, RBAC, MAC, DAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Albalawi, T. S. (2016). A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL. (Doctoral Dissertation). Kent State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241

Chicago Manual of Style (16th Edition):

Albalawi, Talal S. “A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL.” 2016. Doctoral Dissertation, Kent State University. Accessed February 28, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241.

MLA Handbook (7th Edition):

Albalawi, Talal S. “A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL.” 2016. Web. 28 Feb 2021.

Vancouver:

Albalawi TS. A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL. [Internet] [Doctoral dissertation]. Kent State University; 2016. [cited 2021 Feb 28]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241.

Council of Science Editors:

Albalawi TS. A NEW APPROACH TO DYNAMIC INTEGRITY CONTROL. [Doctoral Dissertation]. Kent State University; 2016. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent1460977241

10. Lacroix, Julien. Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls.

Degree: Docteur es, Mathématiques et informatique, 2015, Aix Marseille Université

Ce document constitue l'aboutissement de trois années de thèse. Après avoir introduit et dégagé la problématique générale se rapportant à mon sujet de thèse, à… (more)

Subjects/Keywords: Cloud; Provenance; Prov; Rétrospective; Confiance; Contrôles d'accès; Rbac; Embrigadement vs réglementation; Cloud; Provenance; Prov; Retrospective; Trust; Access controls; Rbac; Regimentation vs regulation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lacroix, J. (2015). Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls. (Doctoral Dissertation). Aix Marseille Université. Retrieved from http://www.theses.fr/2015AIXM4365

Chicago Manual of Style (16th Edition):

Lacroix, Julien. “Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls.” 2015. Doctoral Dissertation, Aix Marseille Université. Accessed February 28, 2021. http://www.theses.fr/2015AIXM4365.

MLA Handbook (7th Edition):

Lacroix, Julien. “Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls.” 2015. Web. 28 Feb 2021.

Vancouver:

Lacroix J. Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls. [Internet] [Doctoral dissertation]. Aix Marseille Université 2015. [cited 2021 Feb 28]. Available from: http://www.theses.fr/2015AIXM4365.

Council of Science Editors:

Lacroix J. Vers un cloud de confiance : modèles et algorithmes pour une provenance basée sur les contrôles d'accès : Towards a trusted Cloud : models and algorithms for a provenance based on access controls. [Doctoral Dissertation]. Aix Marseille Université 2015. Available from: http://www.theses.fr/2015AIXM4365


Brno University of Technology

11. Novotný, Filip. Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system.

Degree: 2019, Brno University of Technology

 The subject of this paper is data protection by means access control. It compares the difference between DAC and MAC access control and describes the… (more)

Subjects/Keywords: MAC; DAC; RBAC; subjekt; objekt; identita; bezpečnostní kontext; doména; typ; role; MAC; DAC; RBAC; subject; object; identity; security context; domain; type; role

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Novotný, F. (2019). Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/17403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Novotný, Filip. “Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system.” 2019. Thesis, Brno University of Technology. Accessed February 28, 2021. http://hdl.handle.net/11012/17403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Novotný, Filip. “Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system.” 2019. Web. 28 Feb 2021.

Vancouver:

Novotný F. Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/11012/17403.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Novotný F. Rozšířený bezpečnostní model operačního systému, řízení přístupu: Mandatory access control policies of operating system. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/17403

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Nova

12. Gummidi, Srinivasa Raghavendra Bhuvan. Smart-RBAC.

Degree: 2015, Universidade Nova

 Generally, smart campus applications do not consider the role of the user with his/her position in a university environment, consequently irrelevant information is delivered to… (more)

Subjects/Keywords: Smart campus applications; Portlet-based application; Accountability; University environment; Content delivery; Smart-RBAC; Security goals

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gummidi, S. R. B. (2015). Smart-RBAC. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/14568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gummidi, Srinivasa Raghavendra Bhuvan. “Smart-RBAC.” 2015. Thesis, Universidade Nova. Accessed February 28, 2021. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/14568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gummidi, Srinivasa Raghavendra Bhuvan. “Smart-RBAC.” 2015. Web. 28 Feb 2021.

Vancouver:

Gummidi SRB. Smart-RBAC. [Internet] [Thesis]. Universidade Nova; 2015. [cited 2021 Feb 28]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/14568.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gummidi SRB. Smart-RBAC. [Thesis]. Universidade Nova; 2015. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/14568

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Andersson, Jerker. Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet.

Degree: Information Systems, 2015, Dalarna University

Rollbaserad åtkomstkontroll är en standardiserad och väl etablerad modell för att hantera åtkomsträttigheter i informationssystem. Den vedertagna ANSI-standarden 359-2004 saknar dock stöd för att… (more)

Subjects/Keywords: Rollbaserad åtkomstkontroll; RBAC; geografisk avgränsning; spatial avgränsning; säkerhet; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Andersson, J. (2015). Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet. (Thesis). Dalarna University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Andersson, Jerker. “Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet.” 2015. Thesis, Dalarna University. Accessed February 28, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Andersson, Jerker. “Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet.” 2015. Web. 28 Feb 2021.

Vancouver:

Andersson J. Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet. [Internet] [Thesis]. Dalarna University; 2015. [cited 2021 Feb 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Andersson J. Rollbaserad åtkomstkontroll med geografisk avgränsning : En systematisk litteraturgenomgång av det befintliga kunskapstillståndet inom ämnesområdet. [Thesis]. Dalarna University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:du-18700

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


KTH

14. Subedi, Harendra. Mathematical Modelling of Delegation in Role Based Access Control.

Degree: Information and Communication Technology (ICT), 2017, KTH

  One of the most widespread access control model that assigns permissions to a user is Role Based Access Control (RBAC). The basic idea is… (more)

Subjects/Keywords: Delegation; RBAC; Role; Revocation; Role Hierarchy; Formal Methods; Computer and Information Sciences; Data- och informationsvetenskap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Subedi, H. (2017). Mathematical Modelling of Delegation in Role Based Access Control. (Thesis). KTH. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Subedi, Harendra. “Mathematical Modelling of Delegation in Role Based Access Control.” 2017. Thesis, KTH. Accessed February 28, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Subedi, Harendra. “Mathematical Modelling of Delegation in Role Based Access Control.” 2017. Web. 28 Feb 2021.

Vancouver:

Subedi H. Mathematical Modelling of Delegation in Role Based Access Control. [Internet] [Thesis]. KTH; 2017. [cited 2021 Feb 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Subedi H. Mathematical Modelling of Delegation in Role Based Access Control. [Thesis]. KTH; 2017. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222381

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Western Ontario

15. Shermin, Motahera. An Access Control Model for NoSQL Databases.

Degree: 2013, University of Western Ontario

 Current development platforms are web scale, unlike recent platforms which were just network scale. There has been a rapid evolution in computing paradigm that has… (more)

Subjects/Keywords: NoSQL; Access Control; RBAC; Document database; Security; Databases and Information Systems; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Shermin, M. (2013). An Access Control Model for NoSQL Databases. (Thesis). University of Western Ontario. Retrieved from https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Thesis, University of Western Ontario. Accessed February 28, 2021. https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Shermin, Motahera. “An Access Control Model for NoSQL Databases.” 2013. Web. 28 Feb 2021.

Vancouver:

Shermin M. An Access Control Model for NoSQL Databases. [Internet] [Thesis]. University of Western Ontario; 2013. [cited 2021 Feb 28]. Available from: https://ir.lib.uwo.ca/etd/1797.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Shermin M. An Access Control Model for NoSQL Databases. [Thesis]. University of Western Ontario; 2013. Available from: https://ir.lib.uwo.ca/etd/1797

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

16. Bouriche, Khalid. Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems.

Degree: Docteur es, Informatique, 2013, Artois; Université Sidi Mohamed ben Abdellah (Fès, Maroc). Faculté des Sciences et Techniques

La présente thèse s'intéresse à coder la politique de sécurité SELinux en OrBAC et à proposer une extension de ce modèle. Nous avons commencé par… (more)

Subjects/Keywords: SELinux; Orbac; Fedora 14; RedHat 4; RBAC; DTE; TE; MLS; MCS; Incertitude; Possibility theory; Possibilistic logic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bouriche, K. (2013). Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems. (Doctoral Dissertation). Artois; Université Sidi Mohamed ben Abdellah (Fès, Maroc). Faculté des Sciences et Techniques. Retrieved from http://www.theses.fr/2013ARTO0406

Chicago Manual of Style (16th Edition):

Bouriche, Khalid. “Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems.” 2013. Doctoral Dissertation, Artois; Université Sidi Mohamed ben Abdellah (Fès, Maroc). Faculté des Sciences et Techniques. Accessed February 28, 2021. http://www.theses.fr/2013ARTO0406.

MLA Handbook (7th Edition):

Bouriche, Khalid. “Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems.” 2013. Web. 28 Feb 2021.

Vancouver:

Bouriche K. Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems. [Internet] [Doctoral dissertation]. Artois; Université Sidi Mohamed ben Abdellah (Fès, Maroc). Faculté des Sciences et Techniques; 2013. [cited 2021 Feb 28]. Available from: http://www.theses.fr/2013ARTO0406.

Council of Science Editors:

Bouriche K. Gestion de l'incertitude et codage des politiques de sécurité dans les systèmes de contrôle d'accès : Managing uncertainty and encoding security policies in access control systems. [Doctoral Dissertation]. Artois; Université Sidi Mohamed ben Abdellah (Fès, Maroc). Faculté des Sciences et Techniques; 2013. Available from: http://www.theses.fr/2013ARTO0406


University of Illinois – Chicago

17. Gjomemo, Rigel. An Interoperation Framework for Context-aware Access Control.

Degree: 2012, University of Illinois – Chicago

 An access control system can be defined as a set of policies, models and enforcement mechanisms that are used to restrict access to data and… (more)

Subjects/Keywords: Access Control models; Semantic Web; OWL; Description Logic; Context-aware RBAC; Role Based Access Control; Ontology Web Language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gjomemo, R. (2012). An Interoperation Framework for Context-aware Access Control. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/8651

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gjomemo, Rigel. “An Interoperation Framework for Context-aware Access Control.” 2012. Thesis, University of Illinois – Chicago. Accessed February 28, 2021. http://hdl.handle.net/10027/8651.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gjomemo, Rigel. “An Interoperation Framework for Context-aware Access Control.” 2012. Web. 28 Feb 2021.

Vancouver:

Gjomemo R. An Interoperation Framework for Context-aware Access Control. [Internet] [Thesis]. University of Illinois – Chicago; 2012. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10027/8651.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gjomemo R. An Interoperation Framework for Context-aware Access Control. [Thesis]. University of Illinois – Chicago; 2012. Available from: http://hdl.handle.net/10027/8651

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

18. Landberg, Fredrik. Flexible role-handling in command and control systems.

Degree: Electrical Engineering, 2006, Linköping University

  In organizations the permissions a member has is not decided by their person, but by their functions within the organization. This is also the… (more)

Subjects/Keywords: Command and control system; RBAC; access control; vacancy; delegation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Landberg, F. (2006). Flexible role-handling in command and control systems. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Landberg, Fredrik. “Flexible role-handling in command and control systems.” 2006. Thesis, Linköping University. Accessed February 28, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Landberg, Fredrik. “Flexible role-handling in command and control systems.” 2006. Web. 28 Feb 2021.

Vancouver:

Landberg F. Flexible role-handling in command and control systems. [Internet] [Thesis]. Linköping University; 2006. [cited 2021 Feb 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Landberg F. Flexible role-handling in command and control systems. [Thesis]. Linköping University; 2006. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7880

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

19. Xu, Min. Session-aware RBAC administration, delegation, and enforcement with XACML .

Degree: 2010, George Mason University

 An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative permission has the capability to… (more)

Subjects/Keywords: access control; security; administration; delegation; RBAC; XACML

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Xu, M. (2010). Session-aware RBAC administration, delegation, and enforcement with XACML . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/5842

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Xu, Min. “Session-aware RBAC administration, delegation, and enforcement with XACML .” 2010. Thesis, George Mason University. Accessed February 28, 2021. http://hdl.handle.net/1920/5842.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Xu, Min. “Session-aware RBAC administration, delegation, and enforcement with XACML .” 2010. Web. 28 Feb 2021.

Vancouver:

Xu M. Session-aware RBAC administration, delegation, and enforcement with XACML . [Internet] [Thesis]. George Mason University; 2010. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/1920/5842.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Xu M. Session-aware RBAC administration, delegation, and enforcement with XACML . [Thesis]. George Mason University; 2010. Available from: http://hdl.handle.net/1920/5842

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


George Mason University

20. Zhang, Zhixiong. Scalable Role & Organization Based Access Control and Its Administration .

Degree: 2008, George Mason University

 In Role Based Access Control (RBAC), roles are typically created based on job functions inside an organization. Traditional RBAC does not scale up well for… (more)

Subjects/Keywords: RBAC; ROBAC; Administrative ROBAC; Role Based; access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang, Z. (2008). Scalable Role & Organization Based Access Control and Its Administration . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/3110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang, Zhixiong. “Scalable Role & Organization Based Access Control and Its Administration .” 2008. Thesis, George Mason University. Accessed February 28, 2021. http://hdl.handle.net/1920/3110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang, Zhixiong. “Scalable Role & Organization Based Access Control and Its Administration .” 2008. Web. 28 Feb 2021.

Vancouver:

Zhang Z. Scalable Role & Organization Based Access Control and Its Administration . [Internet] [Thesis]. George Mason University; 2008. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/1920/3110.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang Z. Scalable Role & Organization Based Access Control and Its Administration . [Thesis]. George Mason University; 2008. Available from: http://hdl.handle.net/1920/3110

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

21. Yangui, Rahma. Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules.

Degree: Docteur es, Automatique, Génie informatique, Traitement du Signal et des Images, 2016, Ecole centrale de Lille

La sécurité est un enjeu majeur dans le cycle de développement des systèmes critiques, notamment dans le secteur du transport ferroviaire. Cette thèse vise la… (more)

Subjects/Keywords: Sécurité ferroviaire; Règles d'exploitation ferroviaires; Modélisation UML/B; Vérification formelle; Validation formelle; Modèle RBAC; Modèle Or-BAC; Railway safety; Railway operating rules; UML/B modeling; Formal verification; Formal validation; RBAC model; Or-BAC model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yangui, R. (2016). Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules. (Doctoral Dissertation). Ecole centrale de Lille. Retrieved from http://www.theses.fr/2016ECLI0003

Chicago Manual of Style (16th Edition):

Yangui, Rahma. “Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules.” 2016. Doctoral Dissertation, Ecole centrale de Lille. Accessed February 28, 2021. http://www.theses.fr/2016ECLI0003.

MLA Handbook (7th Edition):

Yangui, Rahma. “Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules.” 2016. Web. 28 Feb 2021.

Vancouver:

Yangui R. Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules. [Internet] [Doctoral dissertation]. Ecole centrale de Lille; 2016. [cited 2021 Feb 28]. Available from: http://www.theses.fr/2016ECLI0003.

Council of Science Editors:

Yangui R. Modélisation UML/B pour la validation des exigences de sécurité des règles d'exploitation ferroviaires : UML/B modeling for the safety requirements validation of railway operating rules. [Doctoral Dissertation]. Ecole centrale de Lille; 2016. Available from: http://www.theses.fr/2016ECLI0003


Universidade do Minho

22. Macedo, Ricardo Joaquim Pereira de. Reforço da privacidade através do controlo da pegada digital .

Degree: 2013, Universidade do Minho

 Atualmente existe ainda uma relação assimétrica entre os utilizadores e os fornecedores de serviços disponibilizados pela internet. É prática comum, aquando da apresentação de um… (more)

Subjects/Keywords: “Sticky policies”; Sistema criptográfico; PKE; IBE; ABE; PRE; Controlo de acessos; DAC; MAC; ABAC; RBAC; Linguagem de políticas; XACML; XrML; EPAL; Cryptographic system; Access control; Policy language

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Macedo, R. J. P. d. (2013). Reforço da privacidade através do controlo da pegada digital . (Masters Thesis). Universidade do Minho. Retrieved from http://hdl.handle.net/1822/27853

Chicago Manual of Style (16th Edition):

Macedo, Ricardo Joaquim Pereira de. “Reforço da privacidade através do controlo da pegada digital .” 2013. Masters Thesis, Universidade do Minho. Accessed February 28, 2021. http://hdl.handle.net/1822/27853.

MLA Handbook (7th Edition):

Macedo, Ricardo Joaquim Pereira de. “Reforço da privacidade através do controlo da pegada digital .” 2013. Web. 28 Feb 2021.

Vancouver:

Macedo RJPd. Reforço da privacidade através do controlo da pegada digital . [Internet] [Masters thesis]. Universidade do Minho; 2013. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/1822/27853.

Council of Science Editors:

Macedo RJPd. Reforço da privacidade através do controlo da pegada digital . [Masters Thesis]. Universidade do Minho; 2013. Available from: http://hdl.handle.net/1822/27853

23. Pooda, Herman. Évaluation et comparaison des modèles de contrôle d'accès.

Degree: M. Sc., Informatique, 2016, Université de Sherbrooke

 La protection des données et de la vie privée des personnes est devenue aujourd’hui un enjeu majeur pour les entreprises et les organisations gouvernementales qui… (more)

Subjects/Keywords: Contrôle d’accès; Dossier santé électronique; Protection de la vie privée; Évaluation des modèles de contrôle d’accès; Comparaison des modèles de contrôle d’accès; RBAC; XACML; SGAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pooda, H. (2016). Évaluation et comparaison des modèles de contrôle d'accès. (Masters Thesis). Université de Sherbrooke. Retrieved from http://www.collectionscanada.gc.ca/obj/thesescanada/vol2/QSHERU/TC-QSHERU-11143_8157.pdf ; http://savoirs.usherbrooke.ca/bitstream/11143/8157/4/Pooda_Herman_MSc_2015.pdf

Chicago Manual of Style (16th Edition):

Pooda, Herman. “Évaluation et comparaison des modèles de contrôle d'accès.” 2016. Masters Thesis, Université de Sherbrooke. Accessed February 28, 2021. http://www.collectionscanada.gc.ca/obj/thesescanada/vol2/QSHERU/TC-QSHERU-11143_8157.pdf ; http://savoirs.usherbrooke.ca/bitstream/11143/8157/4/Pooda_Herman_MSc_2015.pdf.

MLA Handbook (7th Edition):

Pooda, Herman. “Évaluation et comparaison des modèles de contrôle d'accès.” 2016. Web. 28 Feb 2021.

Vancouver:

Pooda H. Évaluation et comparaison des modèles de contrôle d'accès. [Internet] [Masters thesis]. Université de Sherbrooke; 2016. [cited 2021 Feb 28]. Available from: http://www.collectionscanada.gc.ca/obj/thesescanada/vol2/QSHERU/TC-QSHERU-11143_8157.pdf ; http://savoirs.usherbrooke.ca/bitstream/11143/8157/4/Pooda_Herman_MSc_2015.pdf.

Council of Science Editors:

Pooda H. Évaluation et comparaison des modèles de contrôle d'accès. [Masters Thesis]. Université de Sherbrooke; 2016. Available from: http://www.collectionscanada.gc.ca/obj/thesescanada/vol2/QSHERU/TC-QSHERU-11143_8157.pdf ; http://savoirs.usherbrooke.ca/bitstream/11143/8157/4/Pooda_Herman_MSc_2015.pdf


Indian Institute of Science

24. Biswas, Arnab Kumar. Securing Multiprocessor Systems-on-Chip.

Degree: PhD, Faculty of Engineering, 2016, Indian Institute of Science

 With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and… (more)

Subjects/Keywords: Network-on-Chip (NoC); Computer Security; Multiprocessor Systems-on-Chips (MPSoCs); MP-SoC; Role Based Access Control (RBAC); Role Based Shared Memory Access Control; MPSoC; Electronics Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Biswas, A. K. (2016). Securing Multiprocessor Systems-on-Chip. (Doctoral Dissertation). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/2554

Chicago Manual of Style (16th Edition):

Biswas, Arnab Kumar. “Securing Multiprocessor Systems-on-Chip.” 2016. Doctoral Dissertation, Indian Institute of Science. Accessed February 28, 2021. http://etd.iisc.ac.in/handle/2005/2554.

MLA Handbook (7th Edition):

Biswas, Arnab Kumar. “Securing Multiprocessor Systems-on-Chip.” 2016. Web. 28 Feb 2021.

Vancouver:

Biswas AK. Securing Multiprocessor Systems-on-Chip. [Internet] [Doctoral dissertation]. Indian Institute of Science; 2016. [cited 2021 Feb 28]. Available from: http://etd.iisc.ac.in/handle/2005/2554.

Council of Science Editors:

Biswas AK. Securing Multiprocessor Systems-on-Chip. [Doctoral Dissertation]. Indian Institute of Science; 2016. Available from: http://etd.iisc.ac.in/handle/2005/2554

25. MURCIA GUERRERO, IVAN ROLANDO. E-CLOUDS: SERVICIOS EXTENDIDOS .

Degree: 2015, Universidad de los Andes

 Todas las aplicaciones necesitan una funcionalidad de gestión de usuarios, la cual podría ser de un solo usuario, multi-usuario, multi-tenant en el caso de la… (more)

Subjects/Keywords: Manejo de usuarios; SaaS; E-clouds; aplicaciones científicas; RBAC; restricciones; marketplace.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

MURCIA GUERRERO, I. R. (2015). E-CLOUDS: SERVICIOS EXTENDIDOS . (Thesis). Universidad de los Andes. Retrieved from https://documentodegrado.uniandes.edu.co/documentos/9754.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

MURCIA GUERRERO, IVAN ROLANDO. “E-CLOUDS: SERVICIOS EXTENDIDOS .” 2015. Thesis, Universidad de los Andes. Accessed February 28, 2021. https://documentodegrado.uniandes.edu.co/documentos/9754.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

MURCIA GUERRERO, IVAN ROLANDO. “E-CLOUDS: SERVICIOS EXTENDIDOS .” 2015. Web. 28 Feb 2021.

Vancouver:

MURCIA GUERRERO IR. E-CLOUDS: SERVICIOS EXTENDIDOS . [Internet] [Thesis]. Universidad de los Andes; 2015. [cited 2021 Feb 28]. Available from: https://documentodegrado.uniandes.edu.co/documentos/9754.pdf.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

MURCIA GUERRERO IR. E-CLOUDS: SERVICIOS EXTENDIDOS . [Thesis]. Universidad de los Andes; 2015. Available from: https://documentodegrado.uniandes.edu.co/documentos/9754.pdf

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Luleå University of Technology

26. Carlsson, Joachim. Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence.

Degree: 2015, Luleå University of Technology

Validerat; 20150616 (global_studentproject_submitter)

Subjects/Keywords: Technology; Teknik; Business Intelligence; BI; Access Control; DAC; MAC; RBAC; Qlikview

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Carlsson, J. (2015). Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence. (Thesis). Luleå University of Technology. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-55855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Carlsson, Joachim. “Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence.” 2015. Thesis, Luleå University of Technology. Accessed February 28, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-55855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Carlsson, Joachim. “Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence.” 2015. Web. 28 Feb 2021.

Vancouver:

Carlsson J. Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence. [Internet] [Thesis]. Luleå University of Technology; 2015. [cited 2021 Feb 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-55855.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Carlsson J. Business Intelligence Access Control : Utvecklande av en behörighetsmodell för Business Intelligence. [Thesis]. Luleå University of Technology; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-55855

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Linköping University

27. Falkcrona, Jerry. Role-based access control and single sign-on for Web services.

Degree: Electrical Engineering, 2008, Linköping University

  Nowadays, the need for sharing information between different systems in a secure manner is common, not only in the corporate world but also in… (more)

Subjects/Keywords: DACS; Single signon; RBAC; Web services; authentication; Information Systems; Systemvetenskap, informationssystem och informatik

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Falkcrona, J. (2008). Role-based access control and single sign-on for Web services. (Thesis). Linköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Falkcrona, Jerry. “Role-based access control and single sign-on for Web services.” 2008. Thesis, Linköping University. Accessed February 28, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Falkcrona, Jerry. “Role-based access control and single sign-on for Web services.” 2008. Web. 28 Feb 2021.

Vancouver:

Falkcrona J. Role-based access control and single sign-on for Web services. [Internet] [Thesis]. Linköping University; 2008. [cited 2021 Feb 28]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Falkcrona J. Role-based access control and single sign-on for Web services. [Thesis]. Linköping University; 2008. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-11224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Université de Sherbrooke

28. Pooda, Herman. Évaluation et comparaison des modèles de contrôle d'accès.

Degree: 2016, Université de Sherbrooke

 La protection des données et de la vie privée des personnes est devenue aujourd’hui un enjeu majeur pour les entreprises et les organisations gouvernementales qui… (more)

Subjects/Keywords: Contrôle d’accès; Dossier santé électronique; Protection de la vie privée; Évaluation des modèles de contrôle d’accès; Comparaison des modèles de contrôle d’accès; RBAC; XACML; SGAC

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pooda, H. (2016). Évaluation et comparaison des modèles de contrôle d'accès. (Masters Thesis). Université de Sherbrooke. Retrieved from http://hdl.handle.net/11143/8157

Chicago Manual of Style (16th Edition):

Pooda, Herman. “Évaluation et comparaison des modèles de contrôle d'accès.” 2016. Masters Thesis, Université de Sherbrooke. Accessed February 28, 2021. http://hdl.handle.net/11143/8157.

MLA Handbook (7th Edition):

Pooda, Herman. “Évaluation et comparaison des modèles de contrôle d'accès.” 2016. Web. 28 Feb 2021.

Vancouver:

Pooda H. Évaluation et comparaison des modèles de contrôle d'accès. [Internet] [Masters thesis]. Université de Sherbrooke; 2016. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/11143/8157.

Council of Science Editors:

Pooda H. Évaluation et comparaison des modèles de contrôle d'accès. [Masters Thesis]. Université de Sherbrooke; 2016. Available from: http://hdl.handle.net/11143/8157


Delft University of Technology

29. Spiele, P.A. (author). Role Based Access Control Heineken Netherlands.

Degree: 2009, Delft University of Technology

The administration of users and their related permissions in the IT environment is a complex and expensive task. The growing number and variety of applications,… (more)

Subjects/Keywords: IAM; RBAC; Heineken; Role based access control; Identity and Access Management

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Spiele, P. A. (. (2009). Role Based Access Control Heineken Netherlands. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d

Chicago Manual of Style (16th Edition):

Spiele, P A (author). “Role Based Access Control Heineken Netherlands.” 2009. Masters Thesis, Delft University of Technology. Accessed February 28, 2021. http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

MLA Handbook (7th Edition):

Spiele, P A (author). “Role Based Access Control Heineken Netherlands.” 2009. Web. 28 Feb 2021.

Vancouver:

Spiele PA(. Role Based Access Control Heineken Netherlands. [Internet] [Masters thesis]. Delft University of Technology; 2009. [cited 2021 Feb 28]. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d.

Council of Science Editors:

Spiele PA(. Role Based Access Control Heineken Netherlands. [Masters Thesis]. Delft University of Technology; 2009. Available from: http://resolver.tudelft.nl/uuid:d348ecc7-10a3-4517-9c88-934d3778bf8d

30. Komlenovic, Marko. A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation.

Degree: 2011, University of Waterloo

 We consider the distributed access enforcement problem for Role-Based Access Control (RBAC) systems. Such enforcement has become important with RBAC's increasing adoption, and the proliferation… (more)

Subjects/Keywords: Role Based Access Control; Distributed Access Enforcement in RBAC; RBAC; CPOL; Access Matrix; Directed Graph; Reference monitor; Access control policy

…Control (RBAC) [2, 3]. RBAC is becoming the de-facto standard for access… …control in enterprise settings. In RBAC, rather than assigning a user directly to permissions… …with one another in a partial ordering called a role-hierarchy. An example of an RBAC policy… …is shown in Figure 2. 1 Figure 2 - An Example of RBAC policy. Users are shown in diamonds… …context of RBAC. In RBAC, a user exercises permissions in sessions. A session is associated with… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Komlenovic, M. (2011). A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/5731

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Komlenovic, Marko. “A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation.” 2011. Thesis, University of Waterloo. Accessed February 28, 2021. http://hdl.handle.net/10012/5731.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Komlenovic, Marko. “A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation.” 2011. Web. 28 Feb 2021.

Vancouver:

Komlenovic M. A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation. [Internet] [Thesis]. University of Waterloo; 2011. [cited 2021 Feb 28]. Available from: http://hdl.handle.net/10012/5731.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Komlenovic M. A Platform for Assessing the Efficiency of Distributed Access Enforcement in Role Based Access Control (RBAC) and its Validation. [Thesis]. University of Waterloo; 2011. Available from: http://hdl.handle.net/10012/5731

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.